mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-17 10:04:26 +00:00

This patch extends the build option `USE_COHERENT_MEMORY` to conditionally remove coherent memory from the memory maps of all boot loader stages. The patch also adds necessary documentation for coherent memory removal in firmware-design, porting and user guides. Fixes ARM-Software/tf-issues#106 Change-Id: I260e8768c6a5c2efc402f5804a80657d8ce38773
212 lines
6 KiB
C
212 lines
6 KiB
C
/*
|
|
* Copyright (c) 2013-2014, ARM Limited and Contributors. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are met:
|
|
*
|
|
* Redistributions of source code must retain the above copyright notice, this
|
|
* list of conditions and the following disclaimer.
|
|
*
|
|
* Redistributions in binary form must reproduce the above copyright notice,
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
* and/or other materials provided with the distribution.
|
|
*
|
|
* Neither the name of ARM nor the names of its contributors may be used
|
|
* to endorse or promote products derived from this software without specific
|
|
* prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <arch_helpers.h>
|
|
#include <arm_gic.h>
|
|
#include <assert.h>
|
|
#include <bl_common.h>
|
|
#include <debug.h>
|
|
#include <mmio.h>
|
|
#include <platform.h>
|
|
#include <platform_def.h>
|
|
#include <xlat_tables.h>
|
|
#include "../juno_def.h"
|
|
|
|
#define MAP_MHU_SECURE MAP_REGION_FLAT(MHU_SECURE_BASE, \
|
|
MHU_SECURE_SIZE, \
|
|
(MHU_PAYLOAD_CACHED ? \
|
|
MT_MEMORY : MT_DEVICE) \
|
|
| MT_RW | MT_SECURE)
|
|
|
|
#define MAP_FLASH MAP_REGION_FLAT(FLASH_BASE, \
|
|
FLASH_SIZE, \
|
|
MT_MEMORY | MT_RO | MT_SECURE)
|
|
|
|
#define MAP_IOFPGA MAP_REGION_FLAT(IOFPGA_BASE, \
|
|
IOFPGA_SIZE, \
|
|
MT_DEVICE | MT_RW | MT_SECURE)
|
|
|
|
#define MAP_DEVICE0 MAP_REGION_FLAT(DEVICE0_BASE, \
|
|
DEVICE0_SIZE, \
|
|
MT_DEVICE | MT_RW | MT_SECURE)
|
|
|
|
#define MAP_DEVICE1 MAP_REGION_FLAT(DEVICE1_BASE, \
|
|
DEVICE1_SIZE, \
|
|
MT_DEVICE | MT_RW | MT_SECURE)
|
|
|
|
#define MAP_NS_DRAM MAP_REGION_FLAT(DRAM_NS_BASE, \
|
|
DRAM_NS_SIZE, \
|
|
MT_MEMORY | MT_RW | MT_NS)
|
|
|
|
#define MAP_TSP_MEM MAP_REGION_FLAT(TSP_SEC_MEM_BASE, \
|
|
TSP_SEC_MEM_SIZE, \
|
|
MT_MEMORY | MT_RW | MT_SECURE)
|
|
|
|
/*
|
|
* Table of regions for different BL stages to map using the MMU.
|
|
* This doesn't include Trusted RAM as the 'mem_layout' argument passed to
|
|
* configure_mmu_elx() will give the available subset of that,
|
|
*/
|
|
#if IMAGE_BL1
|
|
static const mmap_region_t juno_mmap[] = {
|
|
MAP_MHU_SECURE,
|
|
MAP_FLASH,
|
|
MAP_IOFPGA,
|
|
MAP_DEVICE0,
|
|
MAP_DEVICE1,
|
|
{0}
|
|
};
|
|
#endif
|
|
#if IMAGE_BL2
|
|
static const mmap_region_t juno_mmap[] = {
|
|
MAP_MHU_SECURE,
|
|
MAP_FLASH,
|
|
MAP_IOFPGA,
|
|
MAP_DEVICE0,
|
|
MAP_DEVICE1,
|
|
MAP_NS_DRAM,
|
|
MAP_TSP_MEM,
|
|
{0}
|
|
};
|
|
#endif
|
|
#if IMAGE_BL31
|
|
static const mmap_region_t juno_mmap[] = {
|
|
MAP_MHU_SECURE,
|
|
MAP_IOFPGA,
|
|
MAP_DEVICE0,
|
|
MAP_DEVICE1,
|
|
{0}
|
|
};
|
|
#endif
|
|
#if IMAGE_BL32
|
|
static const mmap_region_t juno_mmap[] = {
|
|
MAP_IOFPGA,
|
|
MAP_DEVICE0,
|
|
MAP_DEVICE1,
|
|
{0}
|
|
};
|
|
#endif
|
|
|
|
/* Array of secure interrupts to be configured by the gic driver */
|
|
const unsigned int irq_sec_array[] = {
|
|
IRQ_MHU,
|
|
IRQ_GPU_SMMU_0,
|
|
IRQ_GPU_SMMU_1,
|
|
IRQ_ETR_SMMU,
|
|
IRQ_TZC400,
|
|
IRQ_TZ_WDOG,
|
|
IRQ_SEC_PHY_TIMER,
|
|
IRQ_SEC_SGI_0,
|
|
IRQ_SEC_SGI_1,
|
|
IRQ_SEC_SGI_2,
|
|
IRQ_SEC_SGI_3,
|
|
IRQ_SEC_SGI_4,
|
|
IRQ_SEC_SGI_5,
|
|
IRQ_SEC_SGI_6,
|
|
IRQ_SEC_SGI_7
|
|
};
|
|
|
|
const unsigned int num_sec_irqs = sizeof(irq_sec_array) /
|
|
sizeof(irq_sec_array[0]);
|
|
|
|
/*******************************************************************************
|
|
* Macro generating the code for the function setting up the pagetables as per
|
|
* the platform memory map & initialize the mmu, for the given exception level
|
|
******************************************************************************/
|
|
#if USE_COHERENT_MEM
|
|
#define DEFINE_CONFIGURE_MMU_EL(_el) \
|
|
void configure_mmu_el##_el(unsigned long total_base, \
|
|
unsigned long total_size, \
|
|
unsigned long ro_start, \
|
|
unsigned long ro_limit, \
|
|
unsigned long coh_start, \
|
|
unsigned long coh_limit) \
|
|
{ \
|
|
mmap_add_region(total_base, total_base, \
|
|
total_size, \
|
|
MT_MEMORY | MT_RW | MT_SECURE); \
|
|
mmap_add_region(ro_start, ro_start, \
|
|
ro_limit - ro_start, \
|
|
MT_MEMORY | MT_RO | MT_SECURE); \
|
|
mmap_add_region(coh_start, coh_start, \
|
|
coh_limit - coh_start, \
|
|
MT_DEVICE | MT_RW | MT_SECURE); \
|
|
mmap_add(juno_mmap); \
|
|
init_xlat_tables(); \
|
|
\
|
|
enable_mmu_el##_el(0); \
|
|
}
|
|
#else
|
|
#define DEFINE_CONFIGURE_MMU_EL(_el) \
|
|
void configure_mmu_el##_el(unsigned long total_base, \
|
|
unsigned long total_size, \
|
|
unsigned long ro_start, \
|
|
unsigned long ro_limit) \
|
|
{ \
|
|
mmap_add_region(total_base, total_base, \
|
|
total_size, \
|
|
MT_MEMORY | MT_RW | MT_SECURE); \
|
|
mmap_add_region(ro_start, ro_start, \
|
|
ro_limit - ro_start, \
|
|
MT_MEMORY | MT_RO | MT_SECURE); \
|
|
mmap_add(juno_mmap); \
|
|
init_xlat_tables(); \
|
|
\
|
|
enable_mmu_el##_el(0); \
|
|
}
|
|
#endif
|
|
/* Define EL1 and EL3 variants of the function initialising the MMU */
|
|
DEFINE_CONFIGURE_MMU_EL(1)
|
|
DEFINE_CONFIGURE_MMU_EL(3)
|
|
|
|
|
|
unsigned long plat_get_ns_image_entrypoint(void)
|
|
{
|
|
return NS_IMAGE_OFFSET;
|
|
}
|
|
|
|
uint64_t plat_get_syscnt_freq(void)
|
|
{
|
|
uint64_t counter_base_frequency;
|
|
|
|
/* Read the frequency from Frequency modes table */
|
|
counter_base_frequency = mmio_read_32(SYS_CNTCTL_BASE + CNTFID_OFF);
|
|
|
|
/* The first entry of the frequency modes table must not be 0 */
|
|
if (counter_base_frequency == 0)
|
|
panic();
|
|
|
|
return counter_base_frequency;
|
|
}
|
|
|
|
void plat_gic_init(void)
|
|
{
|
|
arm_gic_init(GICC_BASE, GICD_BASE, 0, irq_sec_array, num_sec_irqs);
|
|
}
|